Sierra Wireless AirVantage
Sierra Wireless AirVantage devices are affected by vulnerabilities (CWE-352 Cross-Site Request Forgery, CWE-798 Use of Hard-Coded Credentials) that could allow local attackers to execute arbitrary code or gain unauthorized access. The AirVantage Warranty Checker previously returned sensitive device identifiers (IMEI, Serial Number) that could be leveraged for enrollment bypass or unauthorized device activation. Affected products include 4K QUAD (versions 4.5.181 and 4.5.196), MINI (2.6.2), A300 EYES (3.4), and STUDIO R3 (3.6.4). Sierra Wireless has updated the Warranty Checker to stop disclosing unnecessary device identifiers but has not released firmware patches for the underlying vulnerabilities. The recommended mitigations are to disable the AirVantage Management Service if remote management is not needed, or to register devices on the platform and implement network isolation.
- Local network access to the device or warranty checker service
- No authentication required to trigger the vulnerability
- AirVantage Management Service must be enabled on the device for full impact (enrollment/activation attacks)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/298a68c9-2c81-4297-8ab0-11bb8161f2b5